Tuesday, November 30, 2010

10 Fun Ways to Make Money Online

Fun ways to make money online!?… Usually, most money making methods aren’t much of a fun. I mean, although there are so many different ways to make money online from paid surveys and affiliate marketing to blogging, freelancing and more, most of them require a lot of hard work and they are no fun. However, there are a few methods that are actually make making money online fun and enjoyably. Here are 10 fun ways to make money online:


Make money sharing coupons and discount codes
Buxr.com is a Bargain hunting kind of site where online shoppers can go and search for deals and discounts that will help them save money when shopping online. But, you can also earn money, by sharing coupon code and discount deals with others. You can register for free and when you come across a good deal or coupons, simply share it with others on Buxr. If members find the info you provided useful and use it, you earn a commission.

You can also earn money by displaying a Buxr widget on your website or blog which displays shopping deals. Each time one of your visitors clicks on your widget and take advantage of those deals and coupons, you earn a commission. They also give out daily $10 and monthly $100 (or more) prizes to the members.

Make money completing easy tasks
Amazon mechanical turk lets you earn money working on what are called “HITs”. HITs stands for Human Intelligence Tasks. These are task that computers and softwares can not do, so it require a human being to get the job done. Tasks include doing simple things like labeling images, visiting a website and giving your feedback, translating audio files into text, rewriting a sentence in your own words, looking at 2 identical pictures and spotting the differences are some of the task and more. Tasks usually take anywhere from a few seconds to a few minutes to complete and pay from a few cents per task to up to $30 or more per tasks.

Make money from your images
There are a few sites where you can make money by sharing your photos with others. Photography revenue sharing sites such as Fotolia and shutterstock allow you to earn money from your pictures. Simply register and upload any kinds of picture you have and earn a commission every time someone downloads your pictures. Pictures can be from anything, stack of money, cars, pencils, electronics, people, toys, books and anything else you can take a picture of.

Make money hosting live Internet radio shows
BlogTalkRadio is a site where you can host your own internet radio show and earn money from ads displayed on your page. You can make the show into a podcast via RSS and iTunes and have people listen to it online or on any mp3-friendly device. The more audience you have, the more money you can make.

Make money social networking
These days almost everybody uses social networking sites to keep in touch and share information with friends and family. But, how would you like to get paid to do that?… Well, now you can! On MyLot.com you can earn money by simply using their site to socialize with others. Simply do everything hat you would normally do on a social networking site- share pics, participate in discussions, send messages, keep in touch with friends and family, find new friends, invite friends to join,… and earn money for doing so. Basically the more active you are, the more money you make.

Make money selling magazine subscription
This is by far the easiest and most profitable one of all the fun ways to make money online. Since there are magazines on almost any topic you can imagine, selling magazine subscription isn’t that hard, . There is website called AcclaimSubscriptions, which is an affiliate program that you can use to earn commission by getting people to subscribe to different magazines they have.

Here is the kick, they have over 200,000 different magazines on so many different topics that virtually anyone with any interest can be a potential customer for you. After you register for free, you will be given your own referral link. Every time someone clicks on that link and subscribe to any of the 200,000 magazines, you get a commission.

You can place the link on your website, blog, email or anywhere you want. You could even put it on your Facebook page, Myspace, Twitter or any other social networking page you have.

Make money answering questions
Are you knowledgeable about a subject or two? Good at answering questions?… Why not use your knowledge and expertise to earn money on the internet. JustAnswer pays you to answer questions. When you first register and become an expert, you earn 25% of what the person who asks the question is willing to pay for the answer. But, after a while, your earnings increases from 25% to up to 50%. When you reach the minimum requirement for cash out which is $20, you will be paid via paypal.

Make money giving tips!
You can earn cash by giving tips and advice to others on Daytipper. Write a few sentence describing your tips and submit to the site. Every time someone uses that tip, you get a commission. You can also earn cash prizes. Every month they give out 3 cash prizes to the best tip givers. Winner gets $100, second place gets $75 and 3rd place gets $50.

Make money designing and selling custom made t-shirts
You can earn money by designing custom made t-shirts. The good thing is you don’t even need any technical or design skill to design t-shirts. Sites like CafePress and Zazzle have simple drag and drop interfaces that allows anyone to transfer an image or a text to a t-shirt. You can use your own created images and text or you can use their instant design generator to come up with cool designs. You can either sell your designed t-shirt on their site, or you can open your own online store and make money selling your custom designed t-shirts.

Make money doing almost anything
This is really fun and you can make money doing unbelievable and sometimes silly things. Fiverr is a website where people can buy and sell any kind of service for $5. You don’t believe what people actually pay for. Basically you can earn money on fiverr doing anything you can imagine from writing a song, video taping yourself singing a song, making a prank call, wearing a t-shirt with someone’s name on it to tweeting a special message to your followers, teaching someone how to do this or that, building a simple web page for someone, setting up a Facebook fanpage and more.

For each sell you make, $1 goes to fiverr as their commission and the rest ($4) goes to your pocket. Its all about promoting your service good and making it interesting. There are people who are making a living offering to do crazy things for people. I myself use fiverr and have my own fiverr page where I offer services.


These are some really cool ways to make extra money online without having to work for hours upon hours. However, you can’t really make a living doing these. So don’t kid yourself to thinking that you are gonna get rich doing this stuff. Just think of them as a few cool and fun ways to make money online.

How To Make Money With Google Adwords


Google AdWords ads connect you with new customers at the precise moment when they're looking for your products or services. Google AdWords is a pay-per-click online advertisement service that lets advertisers post text ads for their sites targeted for specific keywords. The initial rollout will happen across the AdWords network, and publishers will have the option of choosing if they want image ads or not.

The Adwords model charges the advertiser depending on how successful the ads are, with underperforming ads removed from the system. Unlike other sites selling banner ad space and pay-per-ranking, AdWords provides advertisers with highly effective text ads that are displayed with the search results. Position preference lets you tell Google where you would prefer your ad to show among all the AdWords ads on a given page. And, your AdWords ads can be continually altered and refined to drive even better results. And, should you need to advertise internationally, AdWords lets you target your ads in about 40 different languages, throughout more than 190 countries.

With AdWords ads, your customers will see your ad next to relevant search results they have requested. Unlike other advertising, you can do more than just put your AdWords ads out there, cross your fingers, and hold your breath. Not a great strategy and AdWords self-corrects because ads will be dropped if their display-to-click ratio goes too low. This ensures that AdWords ads are being seen by an even larger number of people. The way Google Adwords positions your ads is also another great advantage of the program. Showing ads by country and language Google AdWords Google allows you to choose your country and language by selecting them in a dropdown box.

While Google AdWords should not be your only advertising campaign, but should be a significant part of your campaign. It is gone.Another way to save money on your Adwords advertising campaign is to wait for the end of the month. You may find it easier to start a new Adwords campaign. Creating an AdWords campaign involves several steps and one of the most important steps is research. Google AdWords is integrated into the existing AdWords campaign management interface and is available to all advertisers. If you are looking to capitalize on the profitable world of internet marketing, consider hiring BuildTraffic to manage your Adwords campaign. track, tweak, and improve your adwords campaign s more...

It's always a good idea to check keyphrases you are to use in Google AdWords campaign for their efficiency and popularity. The management information with Adwords is very useful so set time aside each week to log-in and check how your campaign is performing. You could perform quite well in Google organic listings and run an effective campaign with Adwords. One overlooked key is how to organize your AdWords campaign so you keep you sanity. I have found that unless a program converts at 3 or 4% it's not going to be successful as an adwords campaign... And it may save you hundreds or even thousands of dollars by showing you how to run a smarter AdWords advertising campaign. If you are starting an AdWords campaign, you will want to include many of primary keywords that your prospects search for.

i set up an adwords account yesterday for my site. Many amateur AdWords users will set up an account for ease of use. And find people who are essentially searching for the same keywords the advertiser specifies in the AdWords account manager. Designed especially for large AdWords accounts, it allows you to make changes to your account with greater ease and flexibility. My best advice to those who are having problems is to contact AdWords support, and ask them to take a look at the account. Starter Edition lets users create an AdWords account with a single ad, using a one-page signup form. · Adwords permits you to make up to a hundred ad groups per each account. If your AdWords account is set to a wider audience than that, consider tightening it up. Promotional credit must be applied to the new Google AdWords account within 14 days of creation of such new account.



Google AdWords provide an inexpensive advertising venue for businesses to advertise products or services to a targeted audience. Google AdWords are helping to reinvigorate the online advertising world. Google AdWords provides a simple way to purchase highly targeted advertising, regardless of your budget. One of the big advantages of Google AdWords over Overture is that you are not revealing your advertising spend to competitors. Google AdWords advertising programme is perhaps the very best online marketing process that is available to any business right now. Google Adwords is advertising model that works on the principle of pay per click advertising.

In order to get the most out of Adwords, you must have a list of great keyword and phrases. Unlike pure pay-per-click engines such as Overture, Google's AdWords' ranking system isn't based solely on the amount of money you bid on the keyword. Precede each keyword with a dash; the preceding "-" indicates to the Google AdWords system that the keyword to follow is a negative keyword. Google's AdWords set up has a keyword suggestion option that will work for you and Yahoo! I still probably won't use Adwords' keyword suggestion tool - I'm always interested in more detailed, lower traffic suggestions that it doesn't provide. The less a web page is related to the keyword, the more you have to pay to get an AdWords listing for that keyword.

There are a few super advantages to the AdWords program. not every affiliate program converts well with adwords... Perhaps this was grandfathered in under the old AdWords referral program where the referrer earned $20 after the advertiser spent $20. Don't launch a Google AdWords program until you've read the tips, strategies and techniques in this booklet. In 2005, Google launched the a program to certify individuals and companies who have completed AdWords training and passed an exam. Google Adwords program works on an auction model similar to a second-price auction. However, this success story can help you set a range of expectations with management about what your in-house Adwords program might cost and achieve.

Google AdWords is the single most significant development in online software marketing since the growth of the internet. It helps if you have years of experience in playing the chess game of targeted marketing through Google AdWords and other reliable online channels. By hiring BuildTraffic for Adwords management, you are relieving yourself of the burden of marketing and can focus on running your company. Google AdWords is an ideal marketing tool for small and medium sized businesses. Google AdWords is the ideal marketing tool for small to medium businesses. When I started reading this book I was struck by the depth with which author presents all aspects of AdWords marketing. There has never been a direct marketing tool that is as effective and profitable as Google Adwords. Marketing books with Adwords or Overture is unique in that you only pay if you get a serious bite.

Where Should You Host Your Blog




To answer this question, let's first look at how a blog is created. Just like creating web pages, first, you need a software or script that will take your entries, format it and publish it to the web. The second component of a blog, is the web space, where the software should publish to, a home for the blog pages.

Knowing this information, let's review the different ways to host a blog:

Full blog host.

This is where the blogging system or software is provided for you and your blog is also published to a web space provided by the host. Blogger, SquareSpace and Typepad fall into this category. It's very much like creating a website with a site builder.

Hosted blog software but published elsewhere

This is where the blog software is provided for you but the blog pages are published to another website or web host altogether. By doing this, the software acts as a publishing system like FrontPage except it creates nicely formatted blogs. Blogger is probably the most well known for this. Yes Blogger can do both. Publish to their host or to yours. As a comparison, this is like using FrontPage to publish your website.

Blog software and blog are hosted on your web server

This is where you would install the blog script (software) on your web server – it can be any web hosting account. And when you publish, the blog itself resides on your web server also. To draw a parallel, this technique is like buying web hosting and then installing a content management system on it to help you build web pages.

If you're new to building web pages or have built sites using site builders then you might want to go with a fully hosted blog. These hosts do all the nitty gritty for you and there's very little technical stuff you need to know. If you can point and click, you can build a blog with a full blog host.<



Having said that, just because you're seasoned at building web pages doesn't mean full blog hosts won't work for you. In fact, if you have many blogs this becomes very appealing since you won't have to worry about upgrading the blog script, people exploiting the script, making plug-ins work or what happens when your web host decides to disable part of your blog functions because there is a security hole. All you do is concentrate on blogging. After a while, blogging becomes more important than maintaining your blog and that's the way it should be.

Next up, hosted software but blog is published to your website. This seems to be the best of both worlds. At time of writing, Blogger is one of the best ways to do this but because of its popularity often, you find the system too slow to publish or completely down just when you have a hot idea to share. The idea is good but you'll also be depending on someone else's availability to publish your blog. It's much like using a friend's computer to build your web pages and you know how that can go.

Finally, you have the option to use scripts. This is also a very popular method. The flexibility it allows is very liberating because you can mould the blog anyway you want. You can even get a programmer to create custom plug-ins or customize the whole blogging system the way you want it. In short, you can do pretty much anything you want.

The down side, you need at the very basic, some knowledge of HTML or publishing web pages. Also the burden of upgrading, troubleshooting and maintaining the script is on you. If you have one or two blogs it's not so bad but once you start having more, it can be quite tedious. You also have to consider all the other responsibilities of maintaining the script as mentioned earlier.

Armed with this information, you should be able to figure out which one is for you. If you're still undecided, think of how you would do it if you're creating a regular website. Chances are your choice method for publishing a website is also the best method for you to create a blog.

Why You Should Blog!


I have been blogging for just over two months now. Many of my mentoring students have been asking my advice on blogging. I have so far hesitated to teach much about blogging, because it's not something I feel I "know" yet. I feel much more comfortable teaching about things I know.

Well… I took a look at Alexa today and noticed that this blog almost hit the top 10,000 most visited sites on the Internet today. I have been seeing success with many of the methods that are unique to blog promotion. I felt it was time to write a post about blog promotion… BUT… WAIT! I haven't even explained why I have this blog thing. I can't really jump into getting traffic to your blog without explaining why I have a blog and why you should have one too; now can I?

Let's go back to my history. I "made it" online without many of the tools you see me offering today. I had no products. I had no copywriting ability. My search engine ranking data was my key to my original success on the Internet. I would simply create high ranking web-sites for some market and sell the traffic from those sites directly to those who did have copywriiting ability and products. Obviously I no longer recommend that. Having your own product and copywriting ability are both multipliers to knowing how to get traffic. Now-a-days I focus on all three aspects of your Internet business and recommend that you do the same.

With that said… don't underestimate the traffic business. Consider this. Who is the richest man in the world? Right. Bill Gates. He sells software. Software is a good business! Consider this though. Who are the 3 leading sites on the Internet? Go check Alexa if you don't know. OK; don't check. I'll just tell you:

1. Yahoo

2. Google

3. MSN (Microsoft)

Now take a look at that third one. That's the company that Bill Gates (the richest man in the world; remember?) started. Now he's messing around on the Internet in the #3 spot.

Now; let's take a jump here. What do those three sites sell? Ok; take a minute on this one. There will be a test.

That's right. They sell traffic (or they mostly sell traffic… Yahoo and MSN are a tiny bit more diverse than that). Now isn't that interesting… The richest man in the world… who go that way by selling software… now wants to sell traffic.

OK; that was a diversion. We'll come back to that later. What I wanted to tell you about was my experience selling traffic (which is still the largest part of my business). I made a mistake. I sold traffic anonymously under corporate names. None of my traffic customers know who I am. They just buy traffic from XYZ Corporation because it converts to sales for them. XYZ Corporation has no personality. In fact, it's fully automated and most of my customers seem to like it that way.

I tried to change that a couple of years ago. I started sending them emails teaching how they could get the most out of my traffic service. I was too late. They didn't know me and they didn't want to hear from me.

Then I tried one last attempt (I'm glad I did) by offering them a special on traffic that month. I think I did a two for one deal or something like that. Over 25% of my customers bought a new campaign that day. I made over $60,000 in one day with that one email. I thought that was cool! I still do. I can write a single email and make thousands of dollars in a single day. I think a lot of marketers like that.

The power of your customer list is incredible! If you can convert 2% of strangers into customers with a sales page, you can convert 25% of your existing customers into customers of another product with that same sales page. That's powerful!

I tried it with another product. It was a good product. It was mine. It was the search engine research itself that lead to the traffic those customers were buying. In effect, I was offering to teach them how to generate the same traffic that I was selling to them. It flopped miserably. No-one bought. I tried several other products. Nothing. Why?

Some of the responses told me right away. Even though I was writing under the company name, they didn't know me. I'll repeat that. They didn't know me. They knew my company. They knew that my company delivered great converting traffic, but they simply didn't know me. An endorsement of one company by another isn't very powerful. It isn't nearly as powerful as an endorsement by an individual.<



So, I went on to do the Freedom Events. You know how they went. Based on the endorsement of a few well-known Internet marketers, they sold out. Lesson learned. To get that 25% number, you need one of the following:

1. To be marketing to your customers as a company and selling a special offer on the product of your company that your customers already know about.

2. To be marketing to your customers as a person and selling a special offer on any product that you personally endorse… and have never given a bad endorsement on a product to your customers before.

I wanted to do the latter with my own customers… not those of another Internet marketer.

What is the best way to do that? As I look around, a blog is the absolute perfect vehicle for that. As I sell products (and cross-promote them on the owner's pages), I also promote this blog. I do it very early in the process. It is mentioned on the owner's page and is also mentioned in the very first email most people get after purchasing one of my products.

They buy the product from a stranger, but I introduce myself as the creator of that product very early by pointing them (you) at this blog.

Then, I don't hide the blog behind some corporate image. You do buy my products from a corporation, but do you even know the name of that corporation? Who cares what it is called? I want you to get to know me. That's the purpose of this blog.

Now some folks are finding this blog before they purchase one of my products. That's OK too. Some people buy a product based on the sales page. Some buy because they know the author never produces junk. Some have a combination of those reasons.

OK; so… yes… you should have a blog. I suggest that you create your blog between your 3rd and 4th product in your primary market. That's when I created this blog. That is also when you want to start cross-promoting your 3 or 4 products on their owner's pages.

Here are some other things that I think are important:

1. Register your name for the domain for your blog.

2. Put your name at the top, not some cutesy blog name.

3. Share of yourself. Do not post to your blog like you are a customer service rep answering the phone for a large company… never revealing anything of yourself… only the corporate script. Chat with your customers like they are dear friends. Don't give out your home address or phone number, but within the context of the blog… what are you afraid of? Let your blog readers get to know you.

4. Post often. People can get into the habit of doing something daily or hourly very easily. It is much more difficult to get into a weekly or monthly habit. Post at least daily so your blog readers can get into a daily habit of reading what you have to say.

5. Don't worry about giving away secrets of your products. That's one reason I only sell software, video and mentoring products right now. It's simply not possible to accidently give away too much in text on your blog. Software and video are both more robust mediums than text. I can explain in words all day long how to do something… it will still be useful to buy the software to automate that task and/or buy the video to actually see how it all works.

6. Get a subcribe link up on your blog (and all of your content sites). Some people will want to follow your blog, but won't remember. You need to give them a way to allow you to send them reminders when you post. This will dramatically increase your number of repeat visitors over time.

OK; I think that answers the question about why I have a blog and why you should too… and how you should set it up. Now, I can jump into the specific ways to get traffic to a blog that only exist for blogs… not other types of sites. I'll do that in a future post.

For now, go register your name and get Wordpress installed on that domain. Get your subscribe link up. Write an article and submit it to your blog… and then submit it via Artemis Pro with your blog mentioned in the resource box of your article. That's how I started just a little over two months ago and as of today… I'm almost in the top 10,000 most visited sites on the Internet. See if you can beat me in the next couple of months.

Sunday, November 28, 2010

How-To-Retire-Rich-At-22-Years-Old


Having what you want is important. Most of us, if not all, appreciate having extra money lying around the house. The thrill of finding a hundred dollar bill in your shorts you wore last summer should be not a thrill at all. You deserve to have so much money, an accountant is required to keep up with it all. What's it like having a $1000-$2000 a day popping up in your checking account. Its a much better feel than borrowing from your mother in law, bless her heart and your friends, payday loans, other special people who believe in you.

What's it like to wake up and call your bank 800 no and check how much was deposited while you slept free of stress all night. What's it like to pay cash for a car you saw a day ago. What's it like to pay cash for anything without stretching your budget, or eating hamburgers and living on cheap cereal. Well, the beauty ofretiring at 22 years of age is the same beauty of retiring at any age. We all work. Basically, we are all a little lazy. That is why we all like vacations. We are generally designed to be stress free individuals. Money, much of it, detoxifies the body being released from worry. Set the course for freedom from lack. Prosperity is healthy, adds to spiritual insight, eases pressure on the body. It allows us to be children on the inside again. Free to dream, to believe that anything is possible. Why would anyone choose to be less than prosperous. We have discovered how toretire at any age. The secret of life is in the sharing of what brings blessed wealth, bountiful wealth, and we have found the secret, the methods, the way passport to wealth literally. I am willing to share what I know

The path to wealth is not always what you perceived it to be or anticipated. There are times in our life, we let go, and allow and these are the times we prosper the most

10 Ways To Increase Your Blog's Pageviews


With Google Adsense or Yahoo Publisher, having people click onto more pages helps your revenue immensely, but how do you get them to read more than one page when they visit your website? Here are a few tips.

1. Create pages within the blog that contain reference material you refer to often in your posts. These static pages will also get crawled and indexed by the search engines and as you write posts about your topics you can refer people to these static pages as references to what you are posting about.

2. Use articles as static pages. You can reprint articles on any topic for free by visiting one of the many article directories like http://www.articlecontentprovider.com/articlesubmit/ Then refer people to read the articles that relate to the post you are making. You could even add one article as a new page every time you make a post.

3. Refer to other posts you have made on your blog or on another one of your blogs while posting. This gets the reader to click over to previous posts. You can even decide your posts by browsing previous posts and deciding which one to follow up on. Those archives are not to be lost and forgotten. Its great material, (you wrote it right?), so use it.

4. Create a page that links to your favorite posts that are timeless. You browse your old posts, find posts that you want readers to find easily, then build a links page with those posts directly linked. Then add a link to that page from your front page. Call it favorite posts or whatever and you will benefit by those that click through and follow those links.

5. I've posted here before about the "more" tag. You write your post as normal, then decide where you want to break the post up onto a new page. You put the more tag in and readers have to click to a new page to read the rest of the story.

6. Write once per week special projects. These are a series of articles on a particular topic. You will be offering it once per week giving readers a week to comment on it, then have them hanging on for next weeks special post in the series. Each time add links to previous posts in that series.



7. Using your content from your other websites or blogs is also a great way to get more pageviews for all of them. Use the target new tag and refer to material on your other blogs and websites. It will open a new window leaving the current blog open while they visit your other website or blog. You can quickly double up your pageviews while also introducing your readers to your other websites and blogs.

8. Make a list of 10 previous posts and the links to those posts. Make a post in your blog about 10 things you want your readers to know and read in case they have not done so before. At your suggestion they will at least go see if they have read those posts before, increasing your pageviews once again plus bringing old material to new readers. That also lets them know they should browse the archives for things they have missed.

9. Using that same list of 10 posts or a new one, visit other blogs on your topic. Find posts that talk about something similar to one of those 10 posts, then instead of adding a link in your signature to the home page, make a comment there and refer to the post that is similar and that contains helpful information to that blogger and their readers. You will also be increasing your link popularity while doing this. Do not spam the link. Make sure it actually contains useful information. Don't be trolls or spammers and you will end up with new readers and more page views for your blog.

10. Do not stop being creative. Use the tips in this article, plus invent some of your own ways to interlink your blogposts together. Create pages. Don't just post and forget. That content is valuable, use it. Do not make people search your blog. They are lazy and busy. Bring it to them. That is just good customer service.

I hope this article helps you learn there is more to blogging than just writing a post once in awhile or even daily. If you employ the tips I just gave you into your blog I guarantee you will increase your pageviews which in turn will increase your revenue if using an ad program in your blog.

Saturday, November 27, 2010

Funky To 3D - All You Need To Know About Desktop Art!


One can select from a wide variety of desktop art that is available to make your computer look quite spiffy, and not boring and drab like it looked earlier. There is in particularly an essentially limitless supply of desktop wallpaper available on the internet. The fact is, basically any image that you find on the internet can easily be changed into desktop art and posted on your screen to present a decorative touch. It doesn't matter from where you get the desktop art, or whether it is big or small, free or copyrighted. If it is in the correct graphical format, it can be used as wallpaper for your desktop, easy as can be. On the other hand if it is not in the correct format, there are literally dozens of programs which can do the job of converting it for you.

The screen saver is the most important kind of desktop art. Depending on what type of desktop screen saver that you select, it can be either quite irritating, or a neat distraction. You can even choose to adjust, as in the case of the classical field where you can adjust the number of stars and the speed at which they whiz across your computer screen.

The truth is that, when you are tired and need a break from your work for just a couple of minutes, having an attractive and compelling screen saver to stare off into and daydream can be just do the right trick. And as is the case with a good number of desktop art, there are hundreds and hundreds of screen saversthat can be downloaded for free. Don't be a duped and waste your money on desktop art when so many people are just giving it away!



Evidently, the most novel form of desktop art is animation. Desktop animation is essentially little cartoons that go on in the background of your computer while you type. The most prominent example of this type of desktop art that I know of is the one with the wandering sheep that you have perhaps come across at some time. The ones who parachute down and then amble around your screen, doing all sorts of cute things while you work. But, of course there are many other types of desktop art animation for your entertainment, if sheep are not really your thing.

No matter what you enjoy looking at, from robots to swimsuit models, to flying robotic swimsuit models, someone has most likely designed a cute little desktop animation of it for your screen.

Submitting Your Website To The Search Engines


Proper website promotion is becoming increasingly important. There are literally billions of web pages on the Internet, which makes getting noticed online a very difficult task. The first step to getting your web page visited by your target audience is to submit the page to the search engines. You may think that the search engines, like Yahoo, Google, Altavista, or Excite, somehow search every document on every server to find a match, but that is not the case. In order for a website to be included in search results, the web crawler, or search engine, has to know that the site exists. This is where submitting your website to the search engines becomes important. This is your way of telling the search engines that you exist, so they can point potential viewers to your site. There are several ways to go about submitting your site to the various search engines. You can submit your site directly to each individual search engine, you can use an agent to submit your website for you, or you can use automated article submitters.

The first option is certainly the cheapest option, and you will know that the job is done because you will have done it yourself, but there are several important drawbacks to consider if you are thinking about submitting your website to search engines directly. While it is true that it only costs you your time and there will be no doubt in your mind that it has been done, there are some difficulties. The first one is that it can be a very time-consuming and tedious process. Secondly, submitting these forms is an art; you want to get it right so that you get the best page-ranking possible. If you have no or limited experience in this area, you may want to think twice before submitting articles to the search engines on your own. That being said, if you know what to do and how to do it, submitting on your own can save you money and maybe even a headache or two.<



Another option is to use an agent. This is a real live person who will submit your website to all the search engines manually. This person will ensure that it is done properly, in a timely manner, and in such a way that will maximize your page views. Again, there are some things to consider when you are looking at this option. For starters, you need to make sure you are getting someone reputable who will actually do the job his or herself, and not delegate it to an online submission service, or else you could just be throwing your money away. Also, an agent can be very pricey, so you need to make sure that your website is sufficiently unique to call for such a specialized service.

Lastly, there are automated article submitters all over the World Wide Web. Finding one should not be difficult. Finding a reputable one that is worth the money is a different story. Most of these services come pretty cheap, but you don't get the high level of service you would get through an agent or by doing the job yourself. However, depending on what your specific needs are, the low price and the speed make these submission services an attractive option for many web site owners and webmasters. It is wise to check out your favorite online trade association to make sure that the site you are dealing with is legitimate. Look for things like physical addresses and phone numbers to help verify the legitimacy of any given website submission service.

Targeting Adsense Ads on Your Website


Offline, your business success is measured by location - in other words, your business must be located where people amass looking for what you have to sell.

Online, it's no different. People are looking for information. They "go" where the information is, and you as a webmaster own online real estate. Your website.

Your website content must be full of specific, focused information. If your desired visitors are "everyone", you will fail. You must decide what you are offering to whom, and create in-demand content for those people. Once you have the content, you will get listed highly by the search engines and the traffic will come.

Once on your website, your content must PRE-sell you, your business and, ultimately, whatever your visitors have the opportunity to purchase on your website.

Your perfectly constructed, targeted focused content is a perfect venue for Adsense ads. The Adsense code on your perfected pages will pull up targeted ads for your visitors every time.

But maybe your page has a variety of information on it and you want to emphasize a certain part of it to focus the Adsense ads. Google has something called "section targeting" that you can use under certain circumstances.

You need to be familiar enough with html to add certain code to your site source code, and the sections you want to target need to have a large percentage of your overall page content, enough that Google can understand what you are targeting. You add to the beginning of the section you want to target, and at the end of the section. Google will decide if this section will make youmore money, so if it won't, you won't see any change in your ads. Also, it can take up to a couple weeks to see a change.

This technique is particularly useful in blogs, where Adsense ads have an uncanny knack for picking up on terms you don't want it to use.

It's very simple, but not "easy", to build that content rich website. We're not talking overnight success story here. But a long term income built on honest, solid principles that have stood the test of time is nothing to shrug off.

Build it and the Adsense ads will come.




The Spamming Trap For Online Business Beginners










People who begin their online business ventures would naturally be unaware of many of the internet business rules, protocols and etiquettes. Yet, as in any law, the internet law does not forgive for ignorance. One of the most important issues that are governed by many controls over the internet is Spamming.

A beginner in online business can very easily fall unintentionally into the spamming trap while conducting internet marketing activity to promote his/her business.

Spamming has many faces and forms depending on the marketing activity performed. We will list the marketing activity, the possible spamming forms within each marketing activity, possible consequences and how to avoid unintentional spamming in each spamming form.

1- E-mail Campaigns: The most common spamming method is conducted through e-mail campaigns. E-mail spamming is when you send an e-mail promoting your product or service to someone who did not request any information from you. In many cases beginners fall into the trap of buying lists of e-mails from questionable sources and when sending the e-mail campaign they would realize that one of the following occurred:

a. Received direct complaints.
b. The e-mail account gets shut from the ISP or the hosting provider.
c. Contacted by internet police.

How to avoid e-mail spamming:

a. Make sure that the person who you are sending your campaign to has requested information from you or allowed you to send him e-mails.

b. When buying e-mail lists make sure that the list is safe and has allowed e-mails to be sent to them.

c. Ensure to have a statement at the end of your e-mail that would allow the recipient of your e-mail campaign to opt out if they do not wish to receive any communication from you.

2- Link Submission: Spamming in Link submission could be done in different forms but to cut the story short, you should follow the rules of each directory carefully. Among the very famousrules that are common across many link submission directories:

a. Do not submit your website link in more than one category.
b. Do not submit different pages of your website; submit only your top level link.<

c. Do not submit your link more than once. Search the directory to check if your link already exists.

Failing to follow the rules of each directory would delete your link immediately at this particular directory.

3- Article Submission: Just like link directories, article directories have their own rules as well. Not complying with these rules will make those directories decline your articles. Among the most famous rules are the following:

a. Submit your own work and not somebody else's.
b. Submit a topic that is acceptable by the directory.
c. Do not make your title all in Capital letters. Use Title Caps form.
d. Do not Bold your key words within your article.

4- Posting in Forum: Again you have to read the rules of each forum you intend to be part of before you make any posts. Among the most famous rules are the following:

a. Do not advertise your business in your posts.
b. Do not include affiliate links in your posts.
c. Follow the exact rules of the forum for your sig. file.

Failing to comply will make the forum moderators cancel your account permanently.

5- Blogging: Filling your Blog by copying other people's articles could eliminate your account permanently with yourBlog host.

6- Search Engine Related Spamming Activity:

a. Filling your site content with your keywords will be considered spamming by search engines.
b. Submitting your website to link farms will be considered spamming by search engines.
c. Adding huge amounts of content to your website while your site niche does not usually require such additions will be considered spamming by search engines.
d. Submitting your website to FFA's could be considered as spamming by search engines.
e. Including Keywords in your Keyword tag on your website while they are not related to your website could be considered as spamming by search engines.

I hope this will help all online business beginners to avoid the spamming trap and have a smooth and successful internet marketing activity.

Friday, November 26, 2010

Baggage Handling - And Not The Kind You Take On Vacation!


My friend Susan, a beautiful, intelligent and successful professional single, recently announced that her tumultuous 6-month relationship was over.


"He's got too much baggage and I don't know how to handle it", she explained over a skinny decaf latte at our weekly hangout session.


So how much baggage is too much, and when do we hang out the "overloaded" sign?


It's a fact of life that any man over the age of 30 is going to bring some sort of baggage to a relationship. Heck, I know 20-year-olds with more baggage than the Orient Express!


And it follows that the older we get, the more likely it is that the baggage is going to exponentially increase -- ex wives, children, stepchildren, in-laws, lifestyles or commitments, just to name a few. But it's not about how much baggage he has, it's more about how he (and we!) deal with it.


Kathryn Bigelow, behavioral scientist and director of the Burnett Behavioral Science Unit at Sydney University in Sydney, Australiasays, "Baggage is merely a name for our collective past experiences. What we do with our history and how we manage it is a clear indication of how we will deal with current and future experiences."


So back to my friend Susan. Her difficulty was in trying to deal with her partner's obvious inability to let go of past relationships. According to her, this man wanted to remain friends with every woman he had ever gone out with. At least twice each week he would arrange to meet up with at least one of his ex's for a coffee, or whatever. For Susan, her gripe was how to get his ex's to exit - permanently.


According to Dr Bigelow, here is a list of ways to put the baggage down and get on with life:



*Take a good hard look at what you expect from a relationship and a partner. Then list the absolute essentials. The rest is baggage that needs to be discarded.


*From the list of essentials, try to imagine what it would be like to go without one of your "must-haves" for a day. How would you feel? Then try to imagine letting go for longer. The less demanding we are of ourselves and others, the less baggage we accumulate.


*Take a good hard look at who you are - yes, who you really are. Do an honest appraisal of your good and bad points and decide what you would like to change. Then imagine what it would be like if you could rid yourself of that trait for a day. Then try to imagine how much more space you would have in your life if you could let go of one of your negative qualities for good.


*Don't take yourself too seriously. OK, you're not 20 any more, but that doesn't mean you can't have a little fun. Think about the traits you have that annoy you, or other people, and try to find something funny about them. Creating a humorous side to a bad habit or trait can help diffuse it.


*Be your own best friend and don't beat yourself up about things that happened in the past. The past is in the past, so there's no point in worrying about things you can't change.


*Let go of the anger, resentment or guilt that you may be holding on to. You'll be amazed at how much lighter you'll feel!


We all know how cumbersome it is travelling with excess baggage, and the costs it can incur, so the object is to travel through life with just the right amount of baggage to travel well, but happily.

Measure Ppc Advertising


The efficiency of any program, plan or campaign is known by the results it achieves. The result of a PPC advertising campaign would be to increase the sales of the products/services itadvertises. It is said in Quality Management, "If it can't be measured, it can't be achieved". So the advertiser would have to measure the results to know the success of his program and therefore to take actions based on that.

The goals of an advertisement can be increased number of customers, higher dollar value of sales, requests to subscription of a service or just sharing personal data. The advertiser should be clear about the goals he/she sets out to achieve. Properly articulated goals, followed by well-crafted advertising campaign and periodic measurement of the result would complete the loop of an advertising campaign.

The metrics for measurement are Return-on-Investment (ROI) at the business level, cost per acquisition (CPA) and click-thru-rate (CTR). ROI measures the returns on the advertising budget; CPA measures the cost of converting a viewer/user to a customer; and CTR measures the number of visitors to the website. With increasing bidding prices for keywords, along with the heightened competition to remain at the same ranking, the numbers derived from these metrics become significant for the advertiser to take action upon modifying the campaign, etc.

There are software tools available to track the number of visitors clicking through. ROI and CPA can be measured from the actual sales figures and the advertising dollars spent. A word of caution to the advertisers: it would be myopic to look just at the numbers and miss the whole picture. For instance, a high click-thru-rate may be due to various reasons like fraud, etc and hence CTR has to be correlated to other metrics like CPA and ROI in order to get the real meaning.

With an average online conversion rate of around 2%, an online advertiser has to tightly utilize budget by continuously taking action on the measurements without which, the advertisement would be pulled off the portal where it is hosted, resulting in the loss of business.

Is An Internet Home Business Right For Me?


Here are some things you need to ask yourself:

Why am I considering this an option?

Is it something I really want to do?

Will I be a dedicated home worker or will I sit around the house all day watching TV?

Am I ready to be overwhelmed with information?

Am I ready to be constantly learning and trying new things?

Do I have a positive attitude? (This is crucial in this business)

Will I give up if I don't see results for maybe months?

Alright I'm going to stop right there, this list can go on forever and you should take these questions into consideration. Seriously folks if you don't have the right attitude then there is a big chance you will fail. They say that only 5% of internet marketers are successful, which is a worrying statistic and usually due in relation to the last question posted above.

Why am I considering this an option?
Because you fed up with you job, to much work load, boss is giving you a hard time, your not making enough money or even if you just like the idea of working in the comfort of your own home. It helps to keep reminding yourself of this reason to keep yourself motivated and moving forward with your business.

Is it something I really want to do?
So many people try internet marketing just for a quick fix to get some money, I'll tell you right now it doesn't work that way. People with over the night success stories are very rare and usually have had a press release of some sort. If you are genuinely interested and will constantly stay interested, then good for you, you will go far in this business.

Will I be a dedicated home worker or will I just sit around the house all day watching TV?
A lot of people get stuck in this loop if they have quit their job and are working from home. The problem is it is all to easy to watch some TV then go do some work, at worst do both. Another trap is seeing friends and going out because you are free, this is also a bad move unless you already have a steady stream of income established.

Am I ready to be overwhelmed with information?
Information is everywhere on the net and you will be overloaded with it for quite some time until you digest it. The best thing to do is focus on learning one concept and master it then move on to the next. Some do end up doing everything at once and are usually the ones who succeed the quickest. By all means try to tackle it all at once, if it becomes to much revert to the strategy mentioned above.



Am I ready to be constantly learning and trying new things?
Don't just read the information you have been given, constantly search around for new methods to use better ways to apply those methods and so on. Don't be afraid to try something new, this does not mean try anything. Before you go to sign up with any program make sure you read there sales letter closely and do some research.

Do I have a positive attitude?
More to the point, will I keep this positive attitude even when my business doesn't seem to be going anywhere. No matter what business you are in if you don't see results you tend to get bummed out a bit. It really is crucial to keep this positive attitude to keep you motivated. Take this as an example: You send out an e-mail campaign and get a 0.01% conversion rate (the percentage of people that bought your product or service) you start seeing the business in a negative light and get angry. You wake up the next day and decide not to hop on the computer as you feel the business has let you down. This ends up going in a downward spiral, people tend to delay trying any more because of the supposed constant failure. This is were a positive attitude pays of as were one person try's, fails and quits another person will try, fail and LEARN. Take the experience in a positive light and view how you could have made it better do more research etc.

Will I give up if I don't see results for maybe months?
Results will most likely not be noticeable for at least a month, people tend to expect I put in effort so I will see results. Technically this is true although most of the time they are delayed results. Internet traffic and sales tend to start small and then grow in an exponential fashion. It is crucial that you do not give up this could mean the difference between loosing money or making it.

Recovering Internet Explorer Passwords: Theory and Practice


Recovering Internet Explorer Passwords: Theory and Practice


1. Introduction
2. Types of passwords stored in Internet Explorer
2.1. Internet Credentials
2.2. AutoComplete data
2.3. AutoComplete passwords
2.4. FTP passwords
2.5. Synchronization passwords
2.6. Identities passwords
2.7. AutoForms data
2.8. Content Advisor password
3. Brief overview of Internet Explorer password recovery programs
4. PIEPR - the first acquaintance
5. Three real-life examples
5.1. Recovering current user's FTP passwords
5.2. Recovering website passwords from unloadable operating system
5.3. Recovering uncommonly stored passwords
6. Conclusion



1. Introduction
Nobody will likely dispute the fact that Internet Explorer is today's most popular Web browser. According to the statistics, approximately 70% of online users prefer to use just this program. Arguments about its pros and cons may last forever; still, this browser is the leader of its industry, and this is a fact that requires no proof. Internet Explorer carries several built-in technologies, designed to make average user's life easier. One of them - IntelliSense - is made for taking care of the routine tasks, like the automatic completion of visited webpage addresses, automatic filling of form fields, users' passwords, etc.

Many of today's websites require registration, which means, user would have to enter user name and password. If you use more than a dozen of such websites, you will likely need a password manager. All modern browsers have a built-in password manager in their arsenal, and Internet Explorer is not an odd. Indeed, why would one have to remember yet another password if it is going to be forgotten some time soon anyway? Much easier would be to have browser do the routine work of remembering and storing passwords for you. It's convenient and comfortable.

This would be a totally perfect solution; however, if your Windows operating system crashed or reinstalled not the way it's supposed to be reinstalled, you can easily lose the entire list of your precious passwords. That's the toll for the comfort and convenience. It's good just about every website has a saving 'I forgot password' button. However, this button will not always take your headache from you.

Each software developer solves the forgotten password recovery problem their own way. Some of them officially recommend copying a couple of important files to another folder, while other send all registered users a special utility that allows managing the migration of private data, and the third ones pretend they are not seeing the problem. Nevertheless, the demand creates the offer, and password recovery programs are currently on a great demand.

In this article, let's try to classify types of private data stored in Internet Explorer, look at programs for the recovery of the data, and study real-life examples of recovering lost Internet passwords.



2. Types of passwords stored in Internet Explorer
- Internet Explorer may store the following types of passwords:
- Internet Credentials
- AutoComplete Data
- AutoComplete Passwords
- FTP Passwords
- Synchronization Passwords for cached websites
- Identities Passwords
- AutoForms Data
- Content Advisor Password
Let's take a closer look at each listed item.



2.1. Internet Credentials for websites
Internet credentials mean user's logins and passwords required for accessing certain websites, which are processed by the wininet.dll library. For example, when you try to enter the protected area of a website, you may see the following user name and password prompt (fig.1 http://www.passcape.com/images/ie01.png).

If the option 'Remember my password' is selected in that prompt, the user credentials will be saved to your local computer. The older versions of Windows 9a stored that data in user's PWL file; Windows 2000 and newer store it in the Protected Storage.


2.2. AutoComplete Data
AutoComplete data (passwords will be covered further) are also stored in the Protected Storage and appear as lists of HTML form field names and the corresponding user data. For example, if an HTML page contains an e-mail address entry dialog: once user has entered his e-mail address, the Protected Storage will have the HTML field name, the address value, and the time the record was last accessed.

The HTML page title and website address are not stored. Is that good or bad? It's difficult to determine; more likely to be good than bad. Here are the obvious pros: it saves free space and speeds up browser's performance. If you think the last note is insignificant, try to imagine how you would have to perform several extra checkups in a multi-thousand (this is not as rare as it may seem to be) auto-fill list.

Another obvious plus is that data for identical by name (and often by subject) HTML form fields will be stored in the same place, and the common data will be used for the automatic filling of such pages. We will see this by this example. If one HTML page contains an auto-fill field with the name 'email', and user entered his e-mail address in that field, IE will put in the storage, roughly, 'email=my@email.com'. From now on, if the user opens another website, which has a page with the same field name 'email', the user will be suggested to auto-fill it with the value that he entered on the first page (my@email.com). Thus, the browser somewhat discovers AI capabilities within itself.

The major drawback of this data storage method comes out of its advantage that we just described. Imagine, user has entered auto-fill data on a webpage. If someone knows the HTML form field name, that person can create his own simplest HTML page with the same field name and open it from a local disk. To uncover the data entered in this field, such person will not even have to connect to the Internet and open the original WWW address.



2.3. AutoComplete Passwords
In the case with passwords data, however, as you might have guessed, the data will not be filled in automatically. Since auto-complete passwords are stored along with the Web page name, and each password is bound to only one specific HTML page.

In the new version, Internet Explorer 7, both AutoComplete passwords and data are encrypted completely different; the new encryption method is free from the shortcoming just described (if that can be classified as a shortcoming.)

It is worth noticing that Internet Explorer allows users to manage auto-fill parameters manually, through the options menu (fig.2 http://www.passcape.com/images/ie02.png).



2.4. FTP passwords
FTP site passwords are stored pretty much the same way. It would be relevant to notice that beginning with Windows XP FTP passwords are additionally encrypted with DPAPI. This encryption method uses logon password. Naturally, this makes it much more difficult to recover such lost passwords manually, since now one would need to have the user's Master Key, SID and the account password.

Starting with Microsoft Windows 2000, the operating system began to provide a Data Protection Application-Programming Interface (DPAPI) API. This is simply a pair of function calls that provide OS-level data protection services to user and system processes. By OS-level, we mean a service that is provided by the operating system itself and does not require any additional libraries. By data protection, we mean a service that provides confidentiality of data through encryption. Since the data protection is part of the OS, every application can now secure data without needing any specific cryptographic code other than the necessary function calls to DPAPI. These calls are two simple functions with various options to modify DPAPI behavior. Overall, DPAPI is a very easy-to-use service that will benefit developers that must provide protection for sensitive application data, such as passwords and private keys.
DPAPI is a password-based data protection service: it requires a password to provide protection. The drawback, of course, is that all protection provided by DPAPI rests on the password provided. This is offset by DPAPI using proven cryptographic routines, specifically the strong Triple-DES and AES algorithms, and strong keys, which we'll cover in more detail later. Since DPAPI is focused on providing protection for users and requires a password to provide this protection, it logically uses the user's logon password for protection.
DPAPI is not responsible for storing the confidential information it protects. It is only responsible for encrypting and decrypting data for programs that call it, such as Windows Credential manager, the Private Key storage mechanism, or any third-party programs.
Please refer to Microsoft Web site for more information.



2.5. Synchronization Passwords for cached websites
Synchronization passwords free user from having to enter passwords for cached websites (sites set to be available offline.) Passwords of this type are also stored in IE's Protected Storage.



2.6. Identities passwords
So are identities passwords. The identity-based access management mechanism is not widespread in Microsoft's products, except, perhaps, Outlook Express.


2.7. AutoForms Data
A special paragraph must cover the form auto-fill method, which constitutes a hybrid way of storing data. This method stores the actual data in the Protected Storage, and the URL, which the data belong to, is stored in user's registry. The URL written in the registry is stored not as plaintext - it is stored as hash. Here is the algorithm for reading form auto-fill data in IE 4 - 6:

===8<===========Begin of original text===========
//Get autoform password by given URL
BOOL CAutoformDecrypter::LoadPasswords(LPCTSTR cszUrl, CStringArray *saPasswords)
{
assert(cszUrl && saPasswords);

saPasswords->RemoveAll();

//Check if autoform passwords are present in registry
if ( EntryPresent(cszUrl) )
{
//Read PStore autoform passwords
return PStoreReadAutoformPasswords(cszUrl,saPasswords);
}

return FALSE;
}


//Check if autoform passwords are present
BOOL CAutoformDecrypter::EntryPresent(LPCTSTR cszUrl)
{
assert(cszUrl);

DWORD dwRet, dwValue, dwSize=sizeof(dwValue);
LPCTSTR cszHash=GetHash(cszUrl);

//problems computing the hash
if ( !cszHash )
return FALSE;

//Check the registry
dwRet=SHGetValue(HKCU,_T("Software\\Microsoft\\Internet Explorer\\IntelliForms\\SPW"),cszHash,NULL,&dwValue,&dwSize);
delete((LPTSTR)cszHash);

if ( dwRet==ERROR_SUCCESS )
return TRUE;

m_dwLastError=E_NOTFOUND;
return FALSE;
}


//retrieve hash by given URL text and translate it into hex format
LPCTSTR CAutoformDecrypter::GetHash(LPCTSTR cszUrl)
{
assert(cszUrl);

BYTE buf[0x10];
LPTSTR pRet=NULL;
int i;

if ( HashData(cszUrl,buf,sizeof(buf)) )
{
//Allocate some space
pRet=new TCHAR [sizeof(buf) * sizeof(TCHAR) + sizeof(TCHAR)];
if ( pRet)
{
for ( i=0; i
{
// Translate it into human readable format
pRet[i]=(TCHAR) ((buf[i] & 0x3F) + 0x20);
}
pRet[i]=_T('\0');
}
else
m_dwLastError=E_OUTOFMEMORY;
}

return pRet;
}


//DoHash wrapper
BOOL CAutoformDecrypter::HashData(LPCTSTR cszData, LPBYTE pBuf,
DWORD dwBufSize)
{
assert(cszData && pBuf);

if ( !cszData || !pBuf )
{
m_dwLastError=E_ARG;
return FALSE;
}

DoHash((LPBYTE)cszData,strlen(cszData),pBuf,dwBufSize);
return TRUE;
}


void CAutoformDecrypter::DoHash(LPBYTE pData, DWORD dwDataSize,
LPBYTE pHash, DWORD dwHashSize)
{
DWORD dw=dwHashSize, dw2;

//pre-init loop
while ( dw-->0 )
pHash[dw]=(BYTE)dw;

//actual hashing stuff
while ( dwDataSize-->0 )
{
for ( dw=dwHashSize; dw-->0; )
{
//m_pPermTable = permutation table
pHash[dw]=m_pPermTable[pHash[dw]^pData[dwDataSize]];
}
}
}
===8<============End of original text============

The next, seventh generation of the browser, is most likely going to make this user's data storage mechanism its primary data storage method, declining the good old Protected Storage. Better to say, auto-fill data and passwords, from now on, are going to be stored here.

What is so special and interesting in this mechanism that made MS decide to use it as primary? Well, first of all, it was the encryption idea, which isn't new at all but still simple and genius, to disgrace. The idea is to quit storing encryption keys and generate them whenever that would be necessary. The raw material for such keys would be HTML page's Web address.

Let's see how this idea works in action. Here is IE7's simplified algorithm for saving auto-fill data and password fields:

1 Save Web page's address. We will use this address as the encryption key (EncryptionKey).
2 Obtain Record Key. RecordKey = SHA(EncryptionKey).
3 Calculate checksum for RecordKey to ensure the integrity of the record key (the integrity of the actual data will be guaranteed by DPAPI.) RecordKeyCrc = CRC(RecordKey).
4 Encrypt data (passwords) with the encryption key EncryptedData = DPAPI_Encrypt(Data, EncryptionKey).
5 Save RecordKeyCrc + RecordKey + EncryptedData in the registry.
6 Discard EncryptionKey.

It is very, very difficult to recover password without having the original Web page address. The decryption looks pretty much trivial:

1 When the original Web page is open, we take its address (EncryptionKey) and obtain the record key RecordKey = SHA(EncryptionKey).
2 Browse through the list of all record keys trying to locate the RecordKey.
3 If the RecordKey is found, decrypt data stored along with this key using the EncryptionKey. Data = DPAPI_Decrypt(EncryptedData, EncryptionKey).
In spite of the seeming simplicity, this Web password encryption algorithm is one of today's strongest. However, it has a major drawback (or advantage, depending which way you look at it.) If you change or forget the original Web page address, it will be impossible to recover password for it.



2.8. Content Advisor password
And the last item on our list is Content Advisor password. Content Advisor was originally developed as a tool for restricting access to certain websites. However, for some reason it was unloved by many users (surely, you may disagree with this.) If you once turned Content Advisor on, entered a password and then forgot it, you will not be able to access the majority of websites on the Internet. Fortunately (or unfortunately), this can be easily fixed.

The actual Content Advisor password is not stored as plaintext. Instead, the system calculates its MD5 hash and stores it in Windows registry. On an attempt to access the restricted area, the password entered by user is also hashed, and the obtained hash is compared with the one stored in the registry. Take a look at PIEPR source code checking Content Advisor password:


===8<===========Begin of original text===========
void CContentAdvisorDlg::CheckPassword()
{
CRegistry registry;

//read the registry
registry.SetKey(HKLM, "SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\policies\\Ratings");

BYTE pKey[MD5_DIGESTSIZE], pCheck[MD5_DIGESTSIZE];
if ( !registry.GetBinaryData("Key",pKey,MD5_DIGESTSIZE) )
{
MessageBox(MB_ERR,"Can't read the password.");
return;
}

//Get one set by user
CString cs;
m_wndEditPassword.GetWindowText(cs);
MD5Init();
MD5Update((LPBYTE)(LPCTSTR)cs,cs.GetLength()+1);
MD5Final(pCheck);

//Check hashes
if ( memcmp(pKey,pCheck,MD5_DIGESTSIZE)==0 )
MessageBox(MB_OK,"The password is correct!");
else
MessageBox(MB_OK,"Wrong password.");
}
===8<============End of original text============

The first thing you may think about is to try to pick the password by using the brute force or dictionary attack. However, there is a more elegant way to that. You can simply remove the hash from the registry. That's it; so simple... Well, it's better to rename it instead, so that if you ever need it, you can restore it back. Some programs also let users check Content Advisor password, "drag out" password hint, toggle password on/off, etc.



3. Brief Overview of Internet Explorer Password Recovery Programs
It's worth noticing that not all password recovery programs suspect there are so many ways to recover passwords. Most likely, this is related to the fact that some passwords (e.g., synchronization passwords) are not often used in the real life, and FTP passwords are not so simple to be 'dragged out'. Here is a brief overview of the most popular commercial products for recovering passwords for the most popular browser on earth :)

Advanced Internet Explorer Password Recovery from the not unknown company, ElcomSoft - does not recognize AutoForm passwords and encrypted FTP passwords. Not to be excluded, the last version of the program may have learnt to do that. Simple, convenient user interface. The program can be upgraded online automatically.

Internet Explorer Key from PassWare - similarly, does not recognize certain types of passwords. Sometimes the program halts with a critical error when reading some uncommon types of IE's URLs. Displays first two characters of passwords being recovered. The advantages worth noticing are the Spartan user interface and operating convenience.

Internet Explorer Password from Thegrideon Software - not bad, but can recover just three types of Internet Explorer passwords (this is enough for the majority of cases.) Deals with FTP passwords properly. Version 1.1 has problems recovering AutoForm passwords. Has convenient user interface, which in some way reminds one from AIEPR. One can be totally overwhelmed with the beauty and helpfulness of the company's website.
ABF Password Recovery from ABF software - quite a good program with friendly user interface. The list of IE record types supported by the program is not long. Nevertheless, it deals with all of them properly. The program can be classified as a multi-functional one, since it can restore passwords for other programs also.

The major drawback of all programs named here is the capability to recover passwords only for user currently logged on.

As it was said above, the general body of stored Internet Explorer resources is kept in a special storage called Protected Storage. Protected Storage was developed specially for storing personal data. Therefore the functions for working with it (called PS API) are not documented. Protected Storage was first introduced with the release of the version 4 of Internet Explorer, which, by the way, unlike the third version, was written from scratch.

Protected Storage provides applications with an interface to store user data that must be kept secure or free from modification. Units of data stored are called Items. The structure and content of the stored data is opaque to the Protected Storage system. Access to Items is subject to confirmation according to a user-defined Security Style, which specifies what confirmation is required to access the data, such as whether a password is required. In addition, access to Items is subject to an Access rule set. There is an Access rule for each Access Mode: for example, read/write. Access rule sets are composed of Access Clauses. Typically at application setup time, a mechanism is provided to allow a new application to request from the user access to Items that may have been created previously by another application.
Items are uniquely identified by the combination of a Key, Type, Subtype, and Name. The Key is a constant that specifies whether the Item is global to this computer or associated only with this user. The Name is a string, generally chosen by the user. Type and Subtype are GUIDs, generally specified by the application. Additional information about Types and Subtypes is kept in the system registry and include attributes such as Display Name and UI hints. For Subtypes, the parent Type is fixed and included in the system registry as an attribute. The Type group Items is used for a common purpose: for example, Payment or Identification. The Subtype group Items share a common data format.

So, until very recent time, all programs for recovering Internet Explorer passwords used those undocumented API. That's the reason why one significant restriction was applied to the recovery work: PS API can only work with passwords for user that is currently logged on. When the system encrypts data stored in Protected Storage, besides everything else it uses user's SID, without which it is literally impossible (taking into account the current level of computers' calculating performance) to recover stored passwords.

Protected Storage uses a very well thought through data encryption method, which uses master keys and strong algorithms, such as des, sha, and shahmac. Similar data encryption methods are now used in the majority of modern browsers; e.g. in Opera or FireFox. Microsoft, meanwhile, quietly but surely develops and tests new ones. When this article is written, in the pre-Beta version of Internet Explorer 7 Protected Storage was only used for storing FTP passwords.

The analysis of this preliminary version suggests that Microsoft is preparing another 'surprise' in the form of new, interesting encryption algorithms. It is not known for sure, but most likely the new company's data protection technology InfoCard will be involved in the encryption of private data.

Thus, with a great deal of confidence one can assert that with the release of Windows Vista and the 7th version of Internet Explorer passwords will be stored and encrypted with fundamentally new algorithms, and the Protected Storage interface, to all appearances, will become open for third-party developers.

It is somewhat sad, for we think the true potential of Protected Storage was still not uncovered. And this is why we think so:
- First, Protected Storage is based on module structure, which allows plugging other storage providers to it. However, for the last 10 years while Protected Storage exists, not a single new storage provider was created. System Protected Storage is the only storage provider in the operating system, which is used by default.
- Second, Protected Storage has its own, built-in access management system, which, for some reason, is not used in Internet Explorer or in other MS products.
- Third, it is not very clear why MS have decided to decline Protected Storage in storing AutoComplete data and passwords. Decline it as a tried and true data storage, and not data encryption mechanism. It would be more logically proven to keep Protected Storage at least for storing data when implementing a new encryption algorithm. Without fail, there were weighty reasons for that. Therefore, it would be interesting to hear the opinion of MS specialists concerning this subject matter.


4. PIEPR - the First Acquaintance
Passcape Internet Explorer Password Recovery was developed specifically to bypass the PS API's restriction and make it possible to recover passwords directly, from the registry's binary files. Besides, it has a number of additional features for advanced users.

The program's wizard allows you to choose one of several operating modes:
- Automatic: Current user's passwords will be recovered by accessing the closed PS API interface. All current user's passwords currently stored in Internet Explorer will be recovered with a single click of the mouse.
- Manual: Passwords will be recovered without PS API. This method's main advantage is the capability to recover passwords from your old Windows account. For that purpose, you will need to enter path to the user's registry file. Registry files are normally not available for reading; however, the technology used in PIEPR allows doing that (provided you have the local administrative rights.)

User's registry file name is ntuser.dat; its resides in the user's profile, which is normally %SYSTEMDRIVE%:\Documents and Settings\%USERNAME%, where %SYSTEMDRIVE% stands for the system disk with the operating system, and %USERNAME% is normally account name. For instance, path to registry file may look like this: C:\Documents and Settings\John\ntuser.dat

If you have ever been a happy owner of Windows 9x/ME, after you upgrade your operating system to Windows NT, Protected Storage will providently save a copy of your old private data. As a result of that, Protected Storage may contain several user identifiers, so PIEPR will ask you to select the right one before it gets to the decryption of the data (fig.3 http://www.passcape.com/images/ie03.png).

One of the listed SIDs will contain data left by the old Windows 9x/ME. That data is additionally encrypted with user's logon password, and PIEPR currently does not support the decryption of such data.

If ntuser.dat contains encrypted passwords (e.g., FTP sites passwords), the program will need additional information in order to decrypt them (fig.4 http://www.passcape.com/images/ie04.png):
- Logon password of user whose data are to be decrypted
- Full path to the user's MasterKey
- User's SID

Normally, the program finds the last two items in user's profile and fills that data automatically. However, if ntuser.dat was copied from another operating system, you will have to take care of that on your own. The easiest way to get the job done is to copy the entire folder with user's Master Key (there may be several of them) to the folder with ntuser.dat. Master Key resides in the following folder on your local computer: %SYSTEMDRIVE%:\Documents and Settings\%USERNAME%\Application Data\Microsoft\Protect\%UserSid%, where %SYSTEMDRIVE% stands for the system disk with the operating system, %USERNAME% - account name, %UserSid% - user's SID. For example, path to the folder with a master key may look as follows: C:\Documents and Settings\John\Application Data\Microsoft\Protect\S-1-5-21-1587165142-6173081522-185545743-1003. Let's make it clear that it is recommended to copy the entire folder S-1-5-21-1587165142-6173081522-185545743-1003, for it may contain several Master Keys. Then PIEPR will select the right key automatically.

Windows marks some folders as hidden or system, so they are invisible in Windows Explorer. To make them visible, enable showing hidden and system objects in the view settings or use an alternative file manager.

Once the folder with user's Master Key was copied to the folder with ntuser.dat, PIEPR will automatically find the required data, so you will only have to enter user's password for recovering FTP passwords.

Content Advisor
Content Advisor passwords, as it was said already, is not kept as plain text; instead, it is stored as hash. In the Content Advisor password management dialog, it is enough to just delete (you can restore the deleted password at any time later) or change this hash to unlock sites locked with Content Advisor. PIEPR will also display your password hint if there is one.

Asterisks passwords
PIEPR's fourth operating mode, which allows recovering Internet Explorer passwords hidden behind asterisks. To recover such password, simply drag the magnifier to the window with a **** password. This tool allows recovering passwords for other programs that use IE Frames as well; e.g., Windows Explorer, some IE-based browsers, etc.

We have reviewed the basic Internet Explorer password recovery modes. There is also a number of additional features for viewing and editing cookies, cache, visited pages history, etc. We are not going to cover them in detail; instead, we are going to look at a few password recovery examples done with PIEPR.



5.1. Three Real-Life Examples.
Example 1: Recovering current user's FTP password
When opening an FTP site, Internet Explorer pops up the log on dialog (fig.5 http://www.passcape.com/images/ie05.png).

If you have opened this site and set the 'Save password' option in the authentication dialog, the password must be saved in Protected Storage, so recovering it is a pretty trivial job. Select the automatic operating mode in PIEPR and then click 'Next'. Locate our resource in the dialog with decrypted passwords that appears (the site name must appear in the Resource Name column.)

As we see, the decryption of current user's password should not cause any special difficulties. Oh, if the password is not found for some reason - don't forget to check IE's Auto-Complete Settings. Possibly, you have simply not set the program to save passwords.



5.2. Three Real-Life Examples.
Example 2: We will need to recover Web site passwords. The operating system is unbootable.
This is a typical, but not fatal situation. The necessity to recover Internet Explorer passwords after unsuccessful Windows reinstallation occurs just as often.

In either case, we will have user's old profile with all files within it. This set is normally enough to get the job done. In the case with the reinstallation, Windows providently saves the old profile under a different name. For example, if your account name was John, after renaming it may look like John.WORK-72C39A18.

The first and the foremost what you must do is to gain access to files in the old profile. There are two ways to doing this:
- Install a new operating system on a different hard drive; e.g., Windows XP, and hook the old hard drive to it.
- Create a Windows NT boot disk. There are many different utilities for creating boot disks and USB flash disks available online. For instance, you can use WinPE or BartPE. Or a different one. If your old profile was stored on an NTFS part of your hard drive, the boot disk will have to support NTFS.

Let's take the first route. Once we gain access to the old profile, we will need to let the system show hidden and system files. Otherwise, the files we need will be invisible. Open Control Panel, then click on Folder Options, and then select the View tab. On this tab, find the option 'Show hidden files and folders' and select it. Clear the option 'Hide protected operating system files'. When the necessary passwords are recovered, it's better to reset these options to the way they were set before.

Open the program's wizard in the manual mode and enter path to the old profile's registry file. In our case, that is C:\Documents And Settings\ John.WORK-72C39A18\ntuser.dat. Where John.WORK-72C39A18 is the old account name. Click 'Next'.

This data should normally be sufficient for recovering Internet Explorer passwords. However, if there is at least a single encrypted FTP password, the program will request additional data, without which it will not be able to recover such types of passwords:
- User's password
- User's Master Key
- User's SID.
Normally, the program finds the last two items in user's profile and fills that data automatically. However, if that didn't happen, you can do that by hand: copy ntuser.dat and the folder with the Master Key to a separate folder. It is important to copy the entire folder, for it may contain several keys, and the program will select the right one automatically. Then enter path to file ntuser.dat that you have copied to another folder.

That's it. Now we need to enter the old account password, and the recovery will be completed. If you don't care for FTP password, you can skip the user's password, Master Key, and SID entry dialog.



5.3. Three Real-Life Examples.
Example 3: Recovering uncommonly stored passwords.
When we sometimes open a website in the browser, the authentication dialog appears. However, PIEPR fails to recover it in either automatic or manual mode. The 'Save password' option in Internet Explorer is enabled. We will need to recover this password.

Indeed, some websites don't let browser to save passwords in the auto-complete passwords list. Often, such websites are written in JAVA or they use alternative password storage methods; e.g., they store passwords in cookies. A cookie is a small bit of text that accompanies requests and pages as they go between the Web server and browser. The cookie contains information the Web application can read whenever the user visits the site. Cookies provide a useful means in Web applications to store user-specific information. For example, when a user visits your site, you can use cookies to store user preferences or other information. When the user visits your Web site another time, the application can retrieve the information it stored earlier. Cookies are used for all sorts of purposes, all relating to helping the Web site remember you. In essence, cookies help Web sites store information about visitors. A cookie also acts as a kind of calling card, presenting pertinent identification that helps an application know how to proceed. But often cookies criticized for weak security and inaccurate user identification.

If the password field is filled with asterisks, the solution is clear: select the ASTERISKS PASSWORDS operating mode and then open the magic magnifier dialog. Then simply drag the magnifier to the Internet Explorer window (fig.6 http://www.passcape.com/images/ie06.png).

The password (passwords, if the Internet Explorer window has several fields with asterisks) is to appear in the PIEPR window (fig.7 http://www.passcape.com/images/ie07.png).

But it's not always that simple. The password field may be empty or that field may indeed contain *****. In this case, as you have guessed by now, the ASTERISKS PASSWORDS tool will be useless.

We can suppose, the password is stored in cookies. Let's try to locate it. Choose the IE Cookie Explorer tool (fig.8 http://www.passcape.com/images/ie08.png).

The dialog that appears will list the websites that store cookies on your computer. Click on the URL column header to order the websites list alphabetically. This will help us find the right website easier. Go through the list of websites and select the one we need. The list below will display the decrypted cookies for this website (fig.9 http://www.passcape.com/images/ie09.png).

As the figure shows, in our case the login and password are not encrypted and are stored as plain text.

Cookies are often encrypted. In this case, you are not likely to succeed recovering the password. The only thing you can try doing in order to recover the old account is to create a new account. Then you will be able to copy the old cookies in a text editor and replace them with the new ones. However, this is only good when the worst comes to the worst; it is not recommended to use it normally.

Don't forget also that just about all pages and forms with passwords have the 'Forgot password' button.




Conclusion
As this article shows, recovering Internet Explorer passwords is a pretty simple job, which does not require any special knowledge or skills. However, despite of the seeming simplicity, password encryption schemes and algorithms are very well thought through and just as well implemented. Although the Protected Storage concept is over 10 years of age, don't forget that it has proven the very best recommendations of the experts and has been implemented through three generations of this popular browser.

With the release of the next, 7th version of IE, Microsoft is preparing fundamentally new schemes for protecting our private data, where it uses improved encryption algorithms and eliminates shortages peculiar to Protected Storage.

In particular, the analysis of the preliminary beta versions of Internet Explorer 7 has revealed that autoform password encryption keys are no longer stored along with data. They are not stored, period! This is a little know-how, which is to be estimated at its true worth by both professionals and end users, who, finally, will benefits of it anyway.

But the main thing is, the release of the new concept will eliminate the major drawback peculiar to Protected Storage, which is the possibility to recover passwords without knowing the additional information. Better to say, was enough for a potential hacker to gain physical access to the contents of a hard drive, in order to steal or damage passwords and user's other private data. With the release of Internet Explorer 7, the situation will somewhat change.

Meanwhile, we will only have to wait impatiently for the advent of Windows Vista and IE 7 to take a closer look at new encryption mechanisms used in the next generation of this popular browser.



This document may be freely distributed or reproduced provided that the
reference to the original article is placed on each copy of this document.
(c) 2006 Passcape Software. All rights reserved.
http://www.passcape.com

Ten Steps to Reduce Your Risk of Identity Theft


You've probably heard about identity theft on television or read about it in the newspaper, and you may already be aware of the damage these crimes can cause victims and their families. What you may not know is how to protect yourself from these attacks. Below you'll find ten steps that can help you minimize your chances of becoming another identity theft statistic.

1. Invest in a shredder – Never throw anything away without shredding it first. Identity thieves will dig through dumpsters and trash bags looking for credit card receipts, voided checks, paid bills, credit card offers, and other items which provide them with your personal information.

2. Mail everything from the post office – Leaving your outgoing mail in or on your mailbox is an invitation to have it stolen by an identity thief. Not only can they get all of your personal information from the check, but they can even alter the check and cash it themselves. Instead, drop it by the post office or another mailbox.

3. Use a post office box – Incoming mail is also a target for identity thieves. Your bills, checks, even junk mail can be used by these thieves to steal your
personal information. If you have a post office box, then your mail will be delivered safely to that box.

4. Have a non-published phone number – Some identity thieves will also use the telephone in an attempt to get your personal information. For example, one scam involved a caller telling a person he or she had won a government grant that was going to be directly deposited into their checking account. Of course, the caller needed the person's checking account number to deposit the money. If your phone number isn't available, then you won't be harassed by these calls.

5. Check your accounts weekly – If you don't already, you need to get in the habit of checking the balances of all your financial accounts on a weekly basis. Waiting for monthly statements isn't good enough because by then your account could have been completely drained.

6. Check your credit report yearly – Every year, you should request free copies of your credit report and check them for any errors, such as credit cards or loans you never took out. If you find out now that someone is using your identity, you can start correcting the problem before you need to use your own credit.



7. Memorize PIN numbers and passwords – Never write down your PIN numbers or passwords. No place is a safe place to keep these important pieces of information. Keep them in your memory so no one can steal them. Also, make them more complicated than an ordinary word or your birthday. It shouldn't be easy for anyone to guess.

8. Keep only basic information on checks – Your checks should only include basic information about you, such as your name and address. Your social security number should never be printed on your checks. If it is, then you're basically handing over the keys to your identity to any thief who comes in contact with your check.

9. Eliminate unwanted credit card offers – Those credit card offers you throw away can be used by identity thieves. They simply have to complete the application and change the address to have a card sent to them in your name. You should shred them, but you can also call 1-888-567-8688 or visit http://www.optoutprescreen.com to opt-out of the credit card offer mailing list so you'll stop receiving them.

10. Carry only necessities – Never carry anything in your purse or wallet that isn't necessary, such as extra deposit slips, social security cards, birth certificates, etc. The more personal information your purse or wallet contains the more valuable it will be to an identity thief if it is lost or stolen.

Although we only promised ten steps, we're throwing in an extra one to help you protect yourself even further.

11. Go electronic – Bank statements, most bills, and many other documents can all be viewed electronically so you never have to worry about them being stolen out of your mailbox or your trash. Contact your financial institution, credit card companies, and utility providers about the availability of this option. As an extra bonus, many of these businesses offer incentives to individuals who sign up for these electronic programs.

These steps are only some of the ways you can protect yourself from identity thieves. For even more suggestions on reducing your risk or details on what to do if you've been an identity theft victim, you need to read Identity Theft: A Resource Guide from PCSecurityNews.com. The ebook is available at http://www.pcsecuritynews.com.

Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | belt buckles
Design Downloaded from Free Blogger Templates | Free Website Templates